123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140 |
- /*
- * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include "testutil.h"
- #include <openssl/ssl.h>
- typedef struct {
- int proto;
- int min_version;
- int max_version;
- int min_ok;
- int max_ok;
- int expected_min;
- int expected_max;
- } version_test;
- #define PROTO_TLS 0
- #define PROTO_DTLS 1
- #define PROTO_QUIC 2
- /*
- * If a version is valid for *any* protocol then setting the min/max protocol is
- * expected to return success, even if that version is not valid for *this*
- * protocol. However it only has an effect if it is valid for *this* protocol -
- * otherwise it is ignored.
- */
- static const version_test version_testdata[] = {
- /* proto min max ok expected min expected max */
- {PROTO_TLS, 0, 0, 1, 1, 0, 0},
- {PROTO_TLS, SSL3_VERSION, TLS1_3_VERSION, 1, 1, SSL3_VERSION, TLS1_3_VERSION},
- {PROTO_TLS, TLS1_VERSION, TLS1_3_VERSION, 1, 1, TLS1_VERSION, TLS1_3_VERSION},
- {PROTO_TLS, TLS1_VERSION, TLS1_2_VERSION, 1, 1, TLS1_VERSION, TLS1_2_VERSION},
- {PROTO_TLS, TLS1_2_VERSION, TLS1_2_VERSION, 1, 1, TLS1_2_VERSION, TLS1_2_VERSION},
- {PROTO_TLS, TLS1_2_VERSION, TLS1_1_VERSION, 1, 1, TLS1_2_VERSION, TLS1_1_VERSION},
- {PROTO_TLS, SSL3_VERSION - 1, TLS1_3_VERSION, 0, 1, 0, TLS1_3_VERSION},
- {PROTO_TLS, SSL3_VERSION, TLS1_3_VERSION + 1, 1, 0, SSL3_VERSION, 0},
- #ifndef OPENSSL_NO_DTLS
- {PROTO_TLS, DTLS1_VERSION, DTLS1_2_VERSION, 1, 1, 0, 0},
- #endif
- {PROTO_TLS, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION, 0, 0, 0, 0},
- {PROTO_TLS, 7, 42, 0, 0, 0, 0},
- {PROTO_DTLS, 0, 0, 1, 1, 0, 0},
- {PROTO_DTLS, DTLS1_VERSION, DTLS1_2_VERSION, 1, 1, DTLS1_VERSION, DTLS1_2_VERSION},
- #ifndef OPENSSL_NO_DTLS1_2
- {PROTO_DTLS, DTLS1_2_VERSION, DTLS1_2_VERSION, 1, 1, DTLS1_2_VERSION, DTLS1_2_VERSION},
- #endif
- #ifndef OPENSSL_NO_DTLS1
- {PROTO_DTLS, DTLS1_VERSION, DTLS1_VERSION, 1, 1, DTLS1_VERSION, DTLS1_VERSION},
- #endif
- #if !defined(OPENSSL_NO_DTLS1) && !defined(OPENSSL_NO_DTLS1_2)
- {PROTO_DTLS, DTLS1_2_VERSION, DTLS1_VERSION, 1, 1, DTLS1_2_VERSION, DTLS1_VERSION},
- #endif
- {PROTO_DTLS, DTLS1_VERSION + 1, DTLS1_2_VERSION, 0, 1, 0, DTLS1_2_VERSION},
- {PROTO_DTLS, DTLS1_VERSION, DTLS1_2_VERSION - 1, 1, 0, DTLS1_VERSION, 0},
- {PROTO_DTLS, TLS1_VERSION, TLS1_3_VERSION, 1, 1, 0, 0},
- {PROTO_DTLS, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION, 0, 0, 0, 0},
- /* These functions never have an effect when called on a QUIC object */
- {PROTO_QUIC, 0, 0, 1, 1, 0, 0},
- {PROTO_QUIC, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION, 0, 0, 0, 0},
- {PROTO_QUIC, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION + 1, 0, 0, 0, 0},
- {PROTO_QUIC, TLS1_VERSION, TLS1_3_VERSION, 1, 1, 0, 0},
- #ifndef OPENSSL_NO_DTLS
- {PROTO_QUIC, DTLS1_VERSION, DTLS1_2_VERSION, 1, 1, 0, 0},
- #endif
- };
- static int test_set_min_max_version(int idx_tst)
- {
- SSL_CTX *ctx = NULL;
- SSL *ssl = NULL;
- int testresult = 0;
- version_test t = version_testdata[idx_tst];
- const SSL_METHOD *meth = NULL;
- switch (t.proto) {
- case PROTO_TLS:
- meth = TLS_client_method();
- break;
- #ifndef OPENSSL_NO_DTLS
- case PROTO_DTLS:
- meth = DTLS_client_method();
- break;
- #endif
- #ifndef OPENSSL_NO_QUIC
- case PROTO_QUIC:
- meth = OSSL_QUIC_client_method();
- break;
- #endif
- }
- if (meth == NULL)
- return TEST_skip("Protocol not supported");
- ctx = SSL_CTX_new(meth);
- if (ctx == NULL)
- goto end;
- ssl = SSL_new(ctx);
- if (ssl == NULL)
- goto end;
- if (!TEST_int_eq(SSL_CTX_set_min_proto_version(ctx, t.min_version), t.min_ok))
- goto end;
- if (!TEST_int_eq(SSL_CTX_set_max_proto_version(ctx, t.max_version), t.max_ok))
- goto end;
- if (!TEST_int_eq(SSL_CTX_get_min_proto_version(ctx), t.expected_min))
- goto end;
- if (!TEST_int_eq(SSL_CTX_get_max_proto_version(ctx), t.expected_max))
- goto end;
- if (!TEST_int_eq(SSL_set_min_proto_version(ssl, t.min_version), t.min_ok))
- goto end;
- if (!TEST_int_eq(SSL_set_max_proto_version(ssl, t.max_version), t.max_ok))
- goto end;
- if (!TEST_int_eq(SSL_get_min_proto_version(ssl), t.expected_min))
- goto end;
- if (!TEST_int_eq(SSL_get_max_proto_version(ssl), t.expected_max))
- goto end;
- testresult = 1;
- end:
- SSL_free(ssl);
- SSL_CTX_free(ctx);
- return testresult;
- }
- int setup_tests(void)
- {
- ADD_ALL_TESTS(test_set_min_max_version, sizeof(version_testdata) / sizeof(version_test));
- return 1;
- }
|